1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
3 years ago
11

How do you copy from a file to another document​

Computers and Technology
2 answers:
algol133 years ago
7 0

Answer:

you highlight it then double tap and click copy or after it is highlighted press ctrl and c together then to paste you double tap and click paste or you can press ctrl v

Explanation:

mars1129 [50]3 years ago
5 0

Answer: yes

Explanation:

Open File Explorer by pressing Windows+E and navigate to the file you want to copy. Highlight the files you want to copy, and then click “Copy” in the File menu or press Ctrl+C on the keyboard to add them to the clipboard. If you’d rather move items instead, highlight the files you want to move.

You might be interested in
2 (01.01 LC)
myrzilka [38]

Answer:

They write code that translates commands to binary code.

Explanation:

Coding or programming is the process of creating instructions for computers using programming languages. Computer code is used to program the websites, apps, and other technologies we interact with every day.

4 0
3 years ago
To rehearse giving a PowerPoint presentation, Hema would like to print out the presentation with all of the speaker notes. Hema
seraphim [82]

From the given case in the question, Hema would prefer having a handout document for the audience that does not include the slide dates, which are included in her printed notes for the presentation.

To do this, Hema would need to execute option (D) View → Notes and Handouts → Header & Footer → Date and time → Fixed.

This is because the option to modify dates for handouts and notes are in the View tab, not on the insert Tab.

8 0
4 years ago
Which of these statements regarding​ time-cost tradeoffs in CPM networks is​ true?
g100num [7]

Answer:

B. Crashing  is not possible unless there are multiple critical tasks.

8 0
3 years ago
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
Other questions:
  • Define a Python function named file_listers with two parameters. The first parameter will be a string specifying the name of the
    7·1 answer
  • Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without t
    11·1 answer
  • What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typic
    14·1 answer
  • What would be a standard way for anyone outside an agile team( for example, delivery partner partner of the account, head of the
    14·1 answer
  • Write a method that determines the total number of chars in each string of an array.
    12·1 answer
  • Which attribute defines the file name for the specific image in an image tag??
    13·1 answer
  • 3. Output the following:<br>a.<br>21%4​
    12·1 answer
  • 11. a) What is character size measured in?
    5·1 answer
  • A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
    15·1 answer
  • Verizon's implementation of a web-based digital dashboard to provide managers with real-time information such as customer compla
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!